Sciweavers

2281 search results - page 293 / 457
» Security Patterns and Secure Systems Design
Sort
View
136
Voted
CIIT
2004
132views Communications» more  CIIT 2004»
15 years 5 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
CCS
2005
ACM
15 years 9 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
ATAL
2006
Springer
15 years 7 months ago
Enhancing agent-oriented models with aspects
The modular representation of concerns is imperative in the design modeling of multi-agent systems (MASs). However, MAS designers typically face a number of concerns that inherent...
Alessandro F. Garcia, Christina Chavez, Ricardo Ch...
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 9 months ago
The CenSSIS Image Database
The CenSSIS Image Database System is a scientific database that enables effective data management and collaboration to accelerate fundamental research. This paper describes the d...
Huanmei Wu, Becky Norum, Judith Newmark, Betty Sal...
NDSS
1998
IEEE
15 years 8 months ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young